First published: Mon Apr 11 2022(Updated: )
For an AJP 400 response, EAP 7 is improperly sending two response packets and those 'END RESPONSE' packets have the reuse flag set even though JBoss does close the connection. So when httpd reuses that connection after a 400 for something like a cping, it will receive a failure since it reads in the second SEND_HEADERS response packet instead of a CPONG.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2073890 is considered critical as it affects the proper handling of response packets, potentially leading to application failures.
To fix REDHAT-BUG-2073890, you should apply the latest updates and patches provided by Red Hat for JBoss EAP.
The impact of REDHAT-BUG-2073890 on JBoss EAP is that it leads to improper handling of 400 response conditions, affecting connection reusability.
Any user or organization running a vulnerable version of Red Hat JBoss EAP is affected by REDHAT-BUG-2073890.
Currently, there are no known workarounds for REDHAT-BUG-2073890, so applying the recommended updates is essential.